Podcast
Questions and Answers
Which of the following BEST describes the role of the transmitter in a simplified communication model?
Which of the following BEST describes the role of the transmitter in a simplified communication model?
- Transforms and encodes data into a transmittable form. (correct)
- Accepts the already encoded signal from the transmission system.
- Generates the data to be transmitted, like a computer.
- Receives incoming data from the receiver.
In computer networks, under what circumstances is a communication network MOST necessary instead of a direct point-to-point connection?
In computer networks, under what circumstances is a communication network MOST necessary instead of a direct point-to-point connection?
- When devices are located very close to each other.
- When only two devices need to communicate with each other.
- When devices are geographically distant or need to communicate with multiple other devices. (correct)
- When devices need permanent, dedicated connections.
What technological advancement has MOST significantly reduced transmission costs for telephone networks while simultaneously increasing their capacity?
What technological advancement has MOST significantly reduced transmission costs for telephone networks while simultaneously increasing their capacity?
- The development of ISDN.
- Mobile communication networks.
- Advances in VLSI technology.
- The introduction of optical fibers. (correct)
What is a key challenge mobile communication networks face regarding bandwidth?
What is a key challenge mobile communication networks face regarding bandwidth?
What is the PRIMARY function of Local Area Networks (LANs)?
What is the PRIMARY function of Local Area Networks (LANs)?
Why are common transmission methods essential for computers to communicate effectively on a network?
Why are common transmission methods essential for computers to communicate effectively on a network?
Which of the following accurately describes the purpose of the OSI model's layered architecture?
Which of the following accurately describes the purpose of the OSI model's layered architecture?
In the OSI model, what is the role of N-layer protocol?
In the OSI model, what is the role of N-layer protocol?
In the context of OSI model data transmission, what BEST explains the role of headers?
In the context of OSI model data transmission, what BEST explains the role of headers?
Within the OSI model, what is the function of Service Access Points (SAPs)?
Within the OSI model, what is the function of Service Access Points (SAPs)?
Which OSI model layer is responsible for the reliable transfer of data frames, handling error checking, and implementing flow control?
Which OSI model layer is responsible for the reliable transfer of data frames, handling error checking, and implementing flow control?
What does the Network Layer in the OSI model primarily handle?
What does the Network Layer in the OSI model primarily handle?
Which of the following BEST describes the role of the Transport Layer in the OSI model?
Which of the following BEST describes the role of the Transport Layer in the OSI model?
The PRIMARY role of the Presentation Layer within the OSI reference model is to provide what?
The PRIMARY role of the Presentation Layer within the OSI reference model is to provide what?
What is the Application Layer in the OSI model concerned with?
What is the Application Layer in the OSI model concerned with?
In IP networking, what is a key simplification of the OSI model?
In IP networking, what is a key simplification of the OSI model?
What is a defining characteristic of a mesh network topology?
What is a defining characteristic of a mesh network topology?
In hierarchical networks, what type of structure is typically used?
In hierarchical networks, what type of structure is typically used?
What critical function do intermediate nodes perform in both mesh and hierarchical networks?
What critical function do intermediate nodes perform in both mesh and hierarchical networks?
What characterizes a star network configuration?
What characterizes a star network configuration?
What is a PRIMARY disadvantage of a star network topology?
What is a PRIMARY disadvantage of a star network topology?
In a bus network topology, how do devices receive data transmissions?
In a bus network topology, how do devices receive data transmissions?
What is a key limitation of a BUS network topology?
What is a key limitation of a BUS network topology?
In a ring topology, how are devices connected?
In a ring topology, how are devices connected?
Repeaters are leveraged for what fundamental task in the Ring Topology?
Repeaters are leveraged for what fundamental task in the Ring Topology?
In the context of network hubs, what does it mean for a central node to be 'passive'?
In the context of network hubs, what does it mean for a central node to be 'passive'?
What is a Primary function of active hubs, also know as 'repeater hubs'?
What is a Primary function of active hubs, also know as 'repeater hubs'?
In the context of multiple access methods, what characterizes 'fixed assignment'?
In the context of multiple access methods, what characterizes 'fixed assignment'?
Which scenario is DIRECTLY addressed by Random Access methods?
Which scenario is DIRECTLY addressed by Random Access methods?
Why are distributed access controls often preferred for LANs?
Why are distributed access controls often preferred for LANs?
Which technique is BEST suited for adapting to changing network needs for access?
Which technique is BEST suited for adapting to changing network needs for access?
Where are FDMA and TDMA techniques typically used?
Where are FDMA and TDMA techniques typically used?
What is a PRIMARY benefit of CDMA as an access method?
What is a PRIMARY benefit of CDMA as an access method?
Which statement BEST represents the overall goal of access techniques for LANs?
Which statement BEST represents the overall goal of access techniques for LANs?
In the ALOHA access protocol, what happens when a station has a frame to send?
In the ALOHA access protocol, what happens when a station has a frame to send?
In ALOHA, in the event of repeated frame transmission failures on a network, what action does a station take?
In ALOHA, in the event of repeated frame transmission failures on a network, what action does a station take?
What PRIMARY action is taken by the receiving station in the ALOHA protocol upon receiving a frame?
What PRIMARY action is taken by the receiving station in the ALOHA protocol upon receiving a frame?
What are the two Primary reasons for invalid frames in the ALOHA protocol?
What are the two Primary reasons for invalid frames in the ALOHA protocol?
What describes 'vulnerable period' in the context of ALOHA protocols?
What describes 'vulnerable period' in the context of ALOHA protocols?
If 'P' represents the packet transmission time in pure ALOHA, what is its vulnerable period?
If 'P' represents the packet transmission time in pure ALOHA, what is its vulnerable period?
Why is Slotted ALOHA more efficient than Pure ALOHA?
Why is Slotted ALOHA more efficient than Pure ALOHA?
What typically happens to network throughput under heavily trafficked conditions when using ALOHA protocols?
What typically happens to network throughput under heavily trafficked conditions when using ALOHA protocols?
Flashcards
Communications System
Communications System
The fundamental purpose of a communications system is the exchange of data between two parties.
Source
Source
Generates the data to be transmitted. E.g., Phones and PCs.
Transmitter
Transmitter
Transformation and encoding of data in a suitable form for the transmission system.
Transmission System
Transmission System
Signup and view all the flashcards
Receiver
Receiver
Signup and view all the flashcards
Destination
Destination
Signup and view all the flashcards
Simplest form of data communication
Simplest form of data communication
Signup and view all the flashcards
Telephone Network advancements include
Telephone Network advancements include
Signup and view all the flashcards
Data Communications advancements include
Data Communications advancements include
Signup and view all the flashcards
Local Area Networks (LANs)
Local Area Networks (LANs)
Signup and view all the flashcards
LAN Topologies
LAN Topologies
Signup and view all the flashcards
Common Communication Protocols
Common Communication Protocols
Signup and view all the flashcards
Ensure compatibility, developed for data communication.
Ensure compatibility, developed for data communication.
Signup and view all the flashcards
Network Architecture
Network Architecture
Signup and view all the flashcards
Protocol Stack
Protocol Stack
Signup and view all the flashcards
Layering
Layering
Signup and view all the flashcards
Entities at same layer
Entities at same layer
Signup and view all the flashcards
Topology
Topology
Signup and view all the flashcards
OSI Model
OSI Model
Signup and view all the flashcards
OSI Model
OSI Model
Signup and view all the flashcards
Each Layer
Each Layer
Signup and view all the flashcards
Service primitives
Service primitives
Signup and view all the flashcards
Headers
Headers
Signup and view all the flashcards
Transport Layer
Transport Layer
Signup and view all the flashcards
Session Layer
Session Layer
Signup and view all the flashcards
Presentation Layer
Presentation Layer
Signup and view all the flashcards
Application Layer
Application Layer
Signup and view all the flashcards
Bus Topologies
Bus Topologies
Signup and view all the flashcards
STAR Configuration
STAR Configuration
Signup and view all the flashcards
RING Topology
RING Topology
Signup and view all the flashcards
Hub-Based Networks
Hub-Based Networks
Signup and view all the flashcards
Fixed Assignment
Fixed Assignment
Signup and view all the flashcards
Random Contentions
Random Contentions
Signup and view all the flashcards
Scheduled Access
Scheduled Access
Signup and view all the flashcards
Adaptive Strategies
Adaptive Strategies
Signup and view all the flashcards
Vulnerable period
Vulnerable period
Signup and view all the flashcards
Pure ALOHA
Pure ALOHA
Signup and view all the flashcards
Access network
Access network
Signup and view all the flashcards
CSMA Algorithm
CSMA Algorithm
Signup and view all the flashcards
Study Notes
Course Objectives
- Students will learn the basic concepts of computer networks, including network architectures, protocols, and standards like TCP/IP, OSI model, LAN/WAN, and topologies.
- Students will understand the functions of core networking devices like routers, switches, bridges, and gateways and how they enable connectivity and communication.
- Students will analyze the trade-offs between connection-oriented and connectionless services, circuit switching vs packet switching, and other network technology comparisons.
- Students will design and configure local area networks with addressing schemes and routing/switching equipment tailored to meet networking requirements.
- Students will evaluate network protocol stacks to pinpoint common networking issues across physical, data link, and upper layer components.
- Students will troubleshoot connectivity, performance, and reliability issues using tools like ping, traceroute, and SNMP.
- Students will learn network troubleshooting methodologies
- Students will demonstrate understanding of network and infrastructure security issues and mitigation approaches.
Course Content
- Week 1: Introduction to networking
- Week 2: Local Area Network Protocols and Standards
- Week 3: Physical Media
- Week 4: IP Networks
- Week 5: Network Design and Simulation, IPv4
- Week 6: Mid Semester Exam
- Week 7 & 8: IPv6
- Week 9: Industrial Seminar
- Week 10 & 11: Network Security
- Week 12: Final Examination
Course Assessment
- Participation and Class Engagement accounts for 5% of the grade.
- Quizzes and Assignments make up 15%.
- Group Project is 10% of the grade.
- Mid-Semester Exams contribute 20%.
- Final Exam is weighed at 50%.
- Continuous Assessment will include Mid-Semester Exams (20%) and Quizzes and Assignments (10%), for a total of 30%.
- All other forms of Assessment will culminate into the End of Semester Score of 70%
Lecture 1: Introduction
- Topics include communication models, definitions of computer networks, LANs, WANs, ISO – OSI reference model, as well as network components and topologies.
Simplified Communication Model
- The primary goal of any communication system involves exchanging data between two points
- Source: Generates the data to be transmitted, e.g., phones and PCs.
- Transmitter: Transforms and encodes data into a suitable form for the transmission system.
- Transmission System: A single transmission line or a complex network connecting source and destination.
- Receiver: Accepts the signal from the transmission system and adapts it into a form suitable for the destination device.
- Destination: Receives the incoming data from the receiver.
Communication Networks
- Data communication occurs between two devices directly connected by a point-to-point transmission medium.
- A communication network is needed when devices can't be directly connected.
- Optical fibres have reduced transmission costs for telephone networks and increased capacities.
- Satellite communications have enhanced long-distance routes' information-carrying capacity.
- Advances in VLSI technology have led to powerful computers for telephone exchange control
- Mobile communication faces bandwidth constraints
- Computers increased data communications leading to interconnecting computers, terminals, printers at a local level
- Connections to other distant networks are implemented via point-to-point links originally implemented as part of the telephone network, or other WANs.
- voice and data networks converge digital techniques in telephone and mobile telephony networks.
Local Area Networks (LANs)
- LANs operate within a limited geographical area, allowing for different network structures and data access methods compared to larger networks.
- LAN design considerations include network topologies, access techniques, and the parameter, which relates to the ratio of data propagation time to data packet duration.
- Common protocols must be used for computers to be able to communicate effectively.
- Standardization is often based on the ISO Open Systems Interconnection (OSI) model, which provides a structured approach to network communication
The OSI Model and Layered Network Architecture
- Architecture: A system's rules and conventions.
- Protocol Stack: Protocols governing communications.
- The OSI model organizes communication into layers for easier function management and upgrading.
Layered Communication
- Entities at the same OSI layer communicate via an N-layer protocol, creating a virtual communication path.
- Communication goes through the layer and back up at the destination end.
- Each layer adds control (header) information which gets removed by corresponding layer at the receiving end.
Layer Operations
- Each layer is a SERVICE PROVIDER to the layer, and a SERVICE USER to the layer below it.
- N services are given to N+1 entities via SAPs logical interfaces.
- The interaction is managed with SERVICE PRIMITIVES, creating headers.
OSI Model: Lower Layers
- The lower layers depend on the physical technology used and are network dependant
- Physical Layer (Layer 1): Sends raw bits (1s and 0s) over a physical connection, including bit synchronization, cable types, connector shapes, and electrical signal levels.
- Data-Link Layer (Layer 2): Provides reliable data transfer by organizing bits into frames, error checking, and flow control, employing character-oriented or bit-oriented protocols.
- Network Layer (Layer 3): Determines the best data path between devices on different networks including switching and routing.
OSI Model: Upper Layers
- Operate at the host level
- Application: Semantics of app and allows user access by CASES and SASEs
- Presentation: Independence of the data by syntax and provides encryption.
- Session: Structures dialogue and establishes synchronization points and address mapping.
- Transport: Provided end to service communications.
Network Topologies
- Devices are connected in different structures (topologies) depending on how devices are connected.
- Mesh Networks:
- Devices are connected to multiple devices and are used in packet-switched WANs
- Hierarchical Networks:
- Tree like structure for connections, used commonly in telephone systems
- Routing and Switching:
- Decisions on data flow between devices on where to send data for effective transfer of data
Star Configuration
- Every device connects to a central node through point-to-point connections
- The node controls all communications send to the correct device
- Intergrates easily with phone systems
- High speed connections can occur and can be used with single access control
- The central not takes most off the burden of workload and if it fails, the network is affected.
Bus Topology
- Devices are connected together with a single cable
- Signal is heard by all transmitted devices
- Processing, packetization, and access control is needed for all devices
- Easy for new units to connect and single failures doesn't affect the network
- However, cables could reduce bandwidth due to attenuation and is shared amoungst users
- Data gets transmitted by all devices and each device needs to consider whether they need it or not
Ring Topology
- Repeaters are joined by point-to-point links to close the loop
- Data is sent in sequence by each device
- Is easy to install and has efficient use of bandwidth
- Not easy to troubleshoot and has limited scalability
Topologies using Hubs
- Central Node (HUB) is passive, with bus or rings
- usually contains repeater electronics to enable longer link distance
Multiple Access: Broad Categories
- Based on the topology of LAN to give rise to methods of sharing network.
- Fixed Assignment: Channels allocated are static.
- Random/Contention Access: bandwidth is accessed randomly leading to packet collisions.
- Scheduled Access: methods can be centrally and can be distributed depending on how many devices that need use cases
- Adaptive Strategies can accommodate for demands on new networks
ALOHA
- a protocol was developed c.1970 for a packet-radio broadcast network at the University of Hawaii and does not have a LAN concept to local networking. It is a very simple, purely random access protocol.
- Receiving checks for valid frames
- Invalid frames can be caused by*:
- Channel noise.
- Another interference in transmission.
Pure-ALOHA
- A packet is effectively transferred if no other frames are transferred before "P"
- meaning P transmission time giving "2P" for period.
Network performance measures
- Measured in terms of data transfer through units
- normalising: s= λp/ r
- Throughput express in terms of offered load: G = λr/ r
Performance of pure - aloha
- Throughput = offered load . prob. of transmisions done succesfully
- Using G = λp,
Slotted ALOHA
Time is grouped into units to:
- Reduce period known as vulnerable
- Increase throughput
Performance of Aloha protocols
- The throughput lowers due to greater collision rate
- Retransmission rises and offered rises as well
Transmission attempts & Random retransmission delays
- Algoriths are often used when it deals with packet collisions
- Tends to give more throughput
Effect of propagation data delay (at distance)
- Vulerable time period rises to consider data delay period
Carrier sense multiple access (CSMA)
- Stations knowledgable of of packet transmissions
- follow a Listen Before Talk protocol
- Vulnerable time period is reduced to delay network
- Protocols are "slotted".
- Randomn distributed transmissions follow collisions
Basic CSMA Protocols :
- Non persistent
- Where transmissions wait for random time
- Persistent
- Waits for collisions for for channel
- P- persistent proctocols
- Used w/ a slotted scheme and transmissions are done using this setup
Graphs of throughput as function of load
Different persistences compare with load Show that Non-Persistent have better peak throughput compared to other
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore fundamental concepts of computer networks with focus on network architectures, protocols, and networking devices. Compare connection-oriented vs connectionless services. Master troubleshooting connectivity, performance, and reliability issues.